Débora Cabral Nazário, Adroaldo de Andrade, Lucas Borges, Willian Romeu Ramos, J. Todesco, M. Dantas
{"title":"An Enhanced Quality of Context Evaluating Approach in the e-Health Sensor Platform","authors":"Débora Cabral Nazário, Adroaldo de Andrade, Lucas Borges, Willian Romeu Ramos, J. Todesco, M. Dantas","doi":"10.1145/2815317.2815320","DOIUrl":"https://doi.org/10.1145/2815317.2815320","url":null,"abstract":"This paper presents an enhanced approach to the evaluation of Quality of Context (QoC) parameters in a ubiquitous Ambient Assisted Living (AAL) e-Health platform, supporting the care of people with special needs (elderly or with health problems) thus improving their quality of life. At the outset, the study presents a literature review of QoC. Then it introduces the proposed context management architecture. The proposal is initially verified with the Siafu simulator in an AAL scenario where the user's health is monitored with information about blood pressure, heart rate and body temperature. The research proceeded with the use of the e-Health Sensor Platform, a differentiated real environment. The experiment used the sensors: pulse and oxygen in blood, body temperature, blood pressure, patient's position and falls. Considering some parameters, the proposed QoC evaluation allowed verifying the extent to which the context information is up-to-date, valid, accurate, complete and significant. Just as in the simulation, and with the QoC evaluation, the completed real experiment confirmed instances of insufficient QoC and its possible causes, in addition to alerts to potential health problems. This proposal means a big social impact and a technological innovation applied to AAL, at the disposal and support of a significant number of individuals such as elderly or sick people, and with a more precise technology.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can We Predict Future Link States in Wireless Smart Grid?","authors":"Takuma Hamagami, K. Yanagihara, S. Hara","doi":"10.1145/2815317.2815334","DOIUrl":"https://doi.org/10.1145/2815317.2815334","url":null,"abstract":"For rapid deployment and low cost installation, a wired electric power delivery network should be supported by a wireless information communication network, which is called a wireless smart grid in this paper. In a wireless smart grid, every time when information data are collected and delivered, a multi-hop route between a single root node and each sensor node is reactively constructed according to a route selection metric, which is expressed with multiple link selection metrics. Conventional link selection metrics have so far considered that future link states are unpredictable since next data collection/delivery timing is far away. Therefore, instead of prediction, assuming that a link currently giving the best state will be able to give the best state in the future, they have replaced future link states by current ones. On the other hand, one of the authors conducted a one-year channel measurement campaign in the 920 MHz frequency band for a typical suburban area where several tens of sensor nodes kept sending and receiving hello packets in time interval of four minutes. From the measured data, we found that some wireless link states are unpredictable but others are predictable. In this paper, we tackle the problem of whether we can predict future link states in a wireless smart grid. Our performance evaluation results using the measured data reveal that our answer is \"yes,\" that is, when adequately modeling the variation of wireless link state, its prediction is possible even after four minutes and it leads to a visible improvement in link packet error rate (PER) thus route packet collection error rate (CER).","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability Evaluation of Imperfect K-Terminal Stochastic Networks using Polygon-to Chain and Series-parallel Reductions","authors":"M. Rebaiaia, D. Aït-Kadi","doi":"10.1145/2815317.2815336","DOIUrl":"https://doi.org/10.1145/2815317.2815336","url":null,"abstract":"In this paper, we propose a mathematical model for determining the exact value of the reliability of Mobile Ad hoc (MANET) and Wireless Sensor (WSN) Networks which are considered in this research as a collection of Imperfect Stochastic Networks (ISN). The performance in term of reliability is a fundamental challenge in ISN. In the literature several techniques have been used for determining the reliability and few of them are able to produce exact values. The aim of this work introduces a general framework that extends and combines two major models proposed by Satyanarana and Wood, and Carlier and Theologou. These models are based on the reduction using the factoring theorem. The operations of reduction are called Polygon-to Chain and series-parallel decompositions. The algorithm is also very effective for imperfect networks whose nodes and links could fail.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127447045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic Management of Replica Voting based Data Collection Systems in Malicious Environments","authors":"K. Ravindran, Arun Adiththan, M. Rabby, Jinu Jose","doi":"10.1145/2815317.2815319","DOIUrl":"https://doi.org/10.1145/2815317.2815319","url":null,"abstract":"We describe a model-based approach to QoS management in a replica voting based data collection system. The voting among replicated data collection devices achieves trusted data delivery to the end-user in a hostile environment: such as data corruptions by malicious devices and security & bandwidth attacks on the wireless data paths. How often an accurate data is delivered to the user in a timely manner depicts the QoS of data collection system. Aided by a computational model of the voting system, a situational assessment module macroscopically controls the voting system core based on the sensed external events. Our goal is the optimal use of system resources while enforcing an acceptable QoS. The paper describes the management methods for autonomic control of the degree of device replication and/or the algorithmic parameters (e.g., wireless bandwidth allocation) in response to the dynamically changing QoS needs and environment conditions. Our management methods are reusable across different systems, which lowers the software costs in the development of such complex systems.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128302524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noah: Keyed Noise Flooding for Wireless Confidentiality","authors":"Sang-Yoon Chang, Jemin Lee, Yih-Chun Hu","doi":"10.1145/2815317.2815329","DOIUrl":"https://doi.org/10.1145/2815317.2815329","url":null,"abstract":"Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and build a system that is information-theoretically secure against eavesdropping. Leveraging both friendly jamming and signal cancellation, Noah offers a novel keyed noise flooding protocol for wireless confidentiality. In contrast to prior work in wireless security, Noah protocol and its security properties are independent of the individual receiver's channel and do not require the channel link information (such as the channel condition and the antenna location) on the transmitter side. Thus, Noah supports multicast, taking advantage of the inherent broadcast nature of wireless medium, and defeats advanced channel-controlling eavesdroppers by making it impossible to physically separate the transmission and jamming. In this paper, we present the Noah protocol and provide fundamental insights in jamming and rate control for designing Noah.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125481723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Quality Service Voice over Internet Protocol in WiMAX Networks based on IP/MPLS Environment","authors":"R. C. Garcia, B. S. R. Daza, O. S. Parra","doi":"10.1145/2815317.2815322","DOIUrl":"https://doi.org/10.1145/2815317.2815322","url":null,"abstract":"A case study that allows the interconnection of a Wimax structure supported on a MPLS Core is proposed, in order to take advantage of the benefits that offers MPLS working together with traffic engineering, virtual private networks and with the Diffserv technique; using the network Opnet Simulator; and in this way to assess characteristics that offers the switching of labels to transmit voice and video when trying to implement prioritization and differentiation of flows in order to provide QoS IP. Finally, we compare the results found at MPLS against MPLS-TP, and GMPLS technologies, in order to establish which one is the most optimal for sending streams of data susceptible to delays. In this sense the distribution of the article initially establishes a framework that includes a description of the main technologies that provide QoS in data networks, to then describe the methodology used in carrying out the simulations, followed by the presentation and analysis of the results found, to finally present in a comparative table, the validation of the data found against other simulated standards at the same network infrastructure, including their respective conclusions.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117008884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri Net","authors":"Lishi Chen, Chunyan Liu, Hejiao Huang","doi":"10.1145/2815317.2815337","DOIUrl":"https://doi.org/10.1145/2815317.2815337","url":null,"abstract":"Security is a crucial problem for Wireless Mesh Networks (WMNs), and secure routing is a prerequisite for network security. Secure routing averts lots of network attacks. In this paper, a secure routing scheme called Single Trip Detection Mechanism (STDM) is proposed to detect and avoid the wormhole attack in WMNs. In STDM, both intermediate and destination nodes can detect attacks. Attacks would be detected much faster using STDM than using Round Trip Time (RTT) methods. We use Timed Colored Petri Net (TCPN) to formally model and verify STDM. Experiments results show the correctness and effectiveness of STDM using CPN Tools.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126381443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks","authors":"Zeinab Fawaz, A. Mostefaoui, H. Noura","doi":"10.1145/2815317.2815332","DOIUrl":"https://doi.org/10.1145/2815317.2815332","url":null,"abstract":"This paper addresses the general issue of securely transmitting captured images within constrained networks, as those of Wireless Multimedia Sensor Networks (WMSN)s. In particular, it focuses on handling transmission errors due either to unreliable communications or active attacks. The main objective is to preserve the perceived quality of images, received at the destination node, whilst preserving the network resources, mainly communications. To this end, a new scheme, composed on two components, is proposed to defeat against communication errors. The first component consists in a new communication protocol, inspired from the ARQ protocol, at the data-link layer, in order to reduce the number of frames re-transmissions. Combined with the second component which is a novel filtering mechanism to visually correct the received corrupted data at the destination node. Obtained results have validated the powerful strength of the proposed solution to defeat against various types of errors and to enhance the visual quality of images whilst ensuring content reduction and data confidentiality.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115667438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Morelli, C. Stefanelli, M. Tortonesi, Rita Lenzi, Niranjan Suri
{"title":"A Proxy Gateway Solution to Provide QoS in Tactical Networks and Disaster Recovery Scenarios","authors":"A. Morelli, C. Stefanelli, M. Tortonesi, Rita Lenzi, Niranjan Suri","doi":"10.1145/2815317.2815318","DOIUrl":"https://doi.org/10.1145/2815317.2815318","url":null,"abstract":"Many important public services, such as security and public health, as well as the modern tactical military scenarios, rely on Service-oriented Architectures (SoAs) and commercial off-the-shelf (COTS) components to enable the quick development and deployment of distributed services to respond quickly, reduce costs, and ease system integration. However, SoAs make use of verbose networking technologies and require reliable and relatively high bandwidth communications. Tactical scenarios normally cannot rely on such infrastructure and events like natural disasters can severely damage the network infrastructure in rural and urban environments. Thus, there is a need to develop solutions that provide SoA-based application and services running on heterogeneous and often constrained devices that compose tactical and mobile ad-hoc networks with Quality of Service (QoS) levels that meet their requirements. This paper presents the QoS-enabling features and the gateway operational mode (GM) of ACM NetProxy, the network proxy component of a communications middleware specifically developed to support applications in challenged networks. GM allows nodes in an ad-hoc wireless network to be quickly organized and to shape outbound communications to reduce bandwidth consumption and provide QoS. Experimental results obtained during a test in a field demonstration event show its efficiency.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Migault, Daniel Palomares, T. Guggemos, Aurélien Wailly, M. Laurent-Maknavicius, Jean-Philippe Wary
{"title":"Recommendations for IPsec Configuration on Homenet and M2M Devices","authors":"D. Migault, Daniel Palomares, T. Guggemos, Aurélien Wailly, M. Laurent-Maknavicius, Jean-Philippe Wary","doi":"10.1145/2815317.2815323","DOIUrl":"https://doi.org/10.1145/2815317.2815323","url":null,"abstract":"Although there is a strong need to deploy secure communications in home networks and for Machine-to-Machine (M2M) environment, to our knowledge the impact of authenticated encryption migration has not been evaluated yet. As the security performance issue is especially critical for wireless environment, this paper measures the effect of the security settings on the Quality of Service (QoS) for encrypted communications in a home network environment. Security settings include different configurations of IPsec tested over several hardware platforms. The QoS is evaluated based on CPU time and elapsed time for downloading different sized files.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132574673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}